 |
Tuesday, December 19, 2000 |
Recently, a mailing list I'm on forwarded a report of a "hack" of the
CNN.com site. Upon looking closely, I found that the CNN site hadn't
been hacked at all -- it was the *minds* of readers of this hoax "report"
that were being hacked! Rather cute, actually, but it exposes what is
perhaps a larger RISK, so please bear with me while I set up the story...
An MIT student named Eric Varady took a parody news article from
The Onion ,
edited the layout to resemble CNN's format, and copied it to his own site
.
(Note that multiple threatened legal actions have since forced him
to remove the original content, but an explanation page is still there.)
He then passed around a "report of a hack of the CNN site" with a URL
[which I *do* hope makes it through the mail-to-HTML scripts at Catless!] of
.
If you look very closely, you'll see that the actual host named by this URL
is not "www.cnn.com", but "18.69.0.44" (a.k.a. salticus-peckhamae.mit.edu).
That is, for IP-based/Internet URL "schemes" such as HTTP or FTP, the
general format defined in RFC 1738 is:
://[[:]@][:]/
The "user" field is very rarely used, and even then is more often seen with
FTP than HTTP. But since it contained an at-sign before the first slash,
the hoax URL was really
with the (ignored) user field of "www.cnn.com&story=breaking_news". Cute, eh?
More serious scams of this sort are possible, given the number of users
who (1) have *no* idea what the formal syntax of a URL is, and (2) routinely
access the Web through "portals" which often create complicated indirection
URLs to aid with logging or tracking to support advertising revenue, e.g.:
The RISK is that users are being bombarded with these monstrosities so
often that they've grown used to it, and that they'll fail to recognize
when they're being sent someplace they might not really want to go!!
(Perhaps when it's not a joke, such as being sent to a porn site while
working at a company with a "no tolerance" policy.) [rpw3@rigden.engr.sgi.com (Rob Warnock) via risks-digest Volume 21, Issue 16]
0:00
#
G!
| |
On the heels of Paul Nowak's RISKS-21.14 report of the Arizona Motor Vehicle
counterfeiting rings came this somewhat belated report of a break-in at the
Gresham, Oregon DMV office on 12 Dec 2000. The thieves were apparently
pretty well prepared, as they took less than two minutes to take computer
equipment containing personal information on 3,215 people who had recently
obtained licenses, plus blank cards and a machine for making bogus drivers'
licenses and ID cards. [Source: Stuart Tomlinson, *The Oregonian*; PGN-ed.
Was at http://www.oregonlive.com/news/oregonian/metroeast_week.ssf
?/news/oregonian/00/12/metroeast/e6_dmv15.frame] ["Peter G. Neumann" via risks-digest Volume 21, Issue 15]
0:00
#
G!
| |
Maximillian Dornseif, 2002.
|
|
|